Vulnerability Details : CVE-2013-3651
LOCKON EC-CUBE 2.11.2 through 2.12.4 allows remote attackers to conduct unspecified PHP code-injection attacks via a crafted string, related to data/class/SC_CheckError.php and data/class/SC_FormParam.php.
Products affected by CVE-2013-3651
- cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.12.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3651
10.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-3651
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-3651
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3651
-
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000062
JVNDB-2013-000062 - JVN iPedia - 脆弱性対策情報データベース
-
http://www.ec-cube.net/info/weakness/weakness.php?id=49
脆弱性 | ECサイト構築・リニューアルは「ECオープンプラットフォームEC-CUBE」Vendor Advisory
-
http://jvn.jp/en/jp/JVN34900750/index.html
JVN#34900750: EC-CUBE vulnerable to code injection
-
http://svn.ec-cube.net/open_trac/changeset/22891
Changeset 22891 – EC-CUBE TracVendor Advisory
-
http://www.ec-cube.net/info/weakness/20130626/index.php
Jump to